QID 354023
Date Published: 2022-07-25
QID 354023: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-017
due to the small table perturb size, a memory leak flaw was found in the linux kernels tcp source port generation algorithm in the net/ipv4/tcp.c function.
This flaw allows an attacker to leak information and may cause a denial of service. (
( CVE-2022-1012) a use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the linux kernels filesystem sub-component.
This flaw allows a local attacker with a user privilege to cause a denial of service. (
( CVE-2022-1184) a flaw was found in kvm.
With shadow paging enabled if invpcid is executed with cr0.pg=0, the invlpg callback is not set, and the result is a null pointer dereference.
This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service. (
( CVE-2022-1789) a use-after-free vulnerability was found in the linux kernels netfilter subsystem in net/netfilter/nf_tables_api.c.
This flaw allows a local attacker with user access to cause a privilege escalation issue. (
( CVE-2022-1966) no description is available for this( CVE. (
( CVE-2022-1972) a vulnerability was found in the linux kernels nft_set_desc_concat_parse() function .this flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code. (
( CVE-2022-2078) kgdb and kdb allow read and write access to kernel memory, and thus should be restricted during lockdown.
An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered.
Cvss 3.1 base score 6.5 (confidentiality, integrity and availability impacts).
( CVE-2022-32981)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.10-2022-017 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-017.html
CVEs related to QID 354023
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2022-017 | Amazon Linux 2 |
|